SlideShare a Scribd company logo
Matthew Rosenquist
Cybersecurity Strategist
January 2017
Cybersecuritymaybefoughtwith
technology,butitispeoplewhotriumph.
Wemustinvestinthefuturegenerationsof
professionalswhowillcarryonthefight.
Agenda
 Introduction
 Future challenges in cybersecurity drive demand
 Industry best practices and perspectives
 Cybersecurity industry workforce opportunities
 Needed skills, training, and student resources
 Questions and Answers discussion
Biography
Matthew Rosenquist
Cybersecurity Strategist and Evangelist, Intel Corporation
25 years in the field of security, specializing in strategy, threats, operations, crisis management,
measuring value, communications, and establishing strategic organizations which deliver optimal
security capabilities.
As a cybersecurity strategist, he champions the meaningfulness of security, advises on emerging
opportunities and threats, drives industry collaboration, and advocates a sustainable balance of cost,
controls, and productivity across business, governments, and academic sectors.
• Consults globally to governments, academia, business, and cybersecurity professionals
• Built and managed Intel’s global Security Operations Center
• First Incident Commander for Intel’s worldwide CERT
• Managed security for Intel’s multi-billion dollar worldwide M&A activities
• Overseen internal platform security products and services
• Strategic planner for the Intel Architecture security playbook
• Unified synergies forming the 3rd largest global security product organization
• Conducted investigations, defended corporate assets, established policies, developed strategies to
protect Intel’s global manufacturing
Matthew is an outspoken evangelist and advocate of cybersecurity who delivers keynotes, speeches,
lectures, and has a significant social following of security technologists and global professionals.
4
Twitter: @Matt_Rosenquist
LinkedIn Blogs: https://www.linkedin.com/today/author/matthewrosenquist
FutureCybersecurityChallengesdrivedemand
5
Security Industry Needs Leadership
“...If security breaks down, technology breaks down”
Brian Krebs
Noted Cybersecurity Reporter
Innovation Drives Risk Convergence
New technology bridges the virtual and physical worlds,
to connect and enrich peoples lives
Rapid Shift of Skills in the Industry
Needed skills will change over
time, as security, privacy, and
safety evolve.
Strategies will evolve, to expand
what is possible, in order to align
with shifting expectations.
The next generation of security
professionals must understand
and be able to contribute to the
delivery of best-known-practices.
Evolving Landscape, Adversaries, and Battlefield
i
29countries
Have formal cyber
warfare units
i
63countries
Use cyber tools for
surveillance
i
$19billion
US 2017 proposed
budget for
cybersecurity
i
$6trillion
Cyber-crime impact
globally by 2021
i
200%increase
In cyber-crime in
the last 5 years
i
$3–$90trillion
Aggregate innovation impact
of cyber-risks by 2020
Hard-AttackDifficulty-Easy
IMPACT GOES FAR BEYOND
Cybersecurity costs
typically measured as part
of an incident
Actual costs of long term
impacts including lost
contract revenue, operational
disruption, devaluation of
trade name, loss of IP, rises in
insurance premiums,
increased cost to raise debt,
customer relationship impacts
%COST
~1%*
Source: US Tech Manufacturing Company Case Study , Deloitte
~99%
i
35%USpopulation
Healthcare records exposed
in 2015
i
400kNewMalware/Day
575 million unique
samples of malware exist
i
+2BillionUsers
4 billion users online by 2020,
up from 2+ billion in today
i
50-200BillionDevices
Connected to the
Internet by 2020
i
25+MillionApplications
Connected by 2020 creating
50x the volume of data
9
Changing Digital World
10
 Growing Number of Users: 4B connected people
More Users
New Devices
Innovative
Usages
Generating
Vast Data
Sensitive
Functions
Increased
Target Value
 New Devices Types: 50-200B IoT devices
 Innovative Usages and Access: 25M+ applications
 Creation of Vast Amounts of Data: 50 Trillion gigabytes
 Critical Functionality: Infrastructure, Defense, Transportation
Creates Targets with Increased Value
4 Levels of Cybersecurity Impacts
11
Denial of Service (A)
• Access of customers
• Availability of data,
systems, & services
• DDOS network attacks,
ransom-ware data
locking attacks
Data Theft
& Exposure (C)
• ID Theft
• Privacy
• Data Breach
• Transaction data
• Database hacks,
skimming, lost
storage, keylogging
Monitor &
Manipulate (I)
• Internal-access
surveillance for
advantage
• Tamper / Manipulation
• Long-term data
gathering campaign
Own & Obliterate (C/I/A)
• Administrative ownership and control
• Capability of unrecoverable obliteration
• Strategic attack, undermining of org capability
Security Competency
Attacker Innovation
Attacks evolve over time
for different technology
and usages
Security Futures Summary:
12
1. Threats remain equitable to the growth and use of technology
2. Age of massive connectivity (ex. IoT, mesh, 5G/6G, blockchains, etc.) drives
opportunities (for good and bad – cyber threats will take advantage)
3. Society expectations raise for cyber security, privacy, and safety
4. Tipping points approach: threats to life-safety, cybercrime hyper-growth,
offensive cyberwarfare
5. Pendulum swings towards more security, ultimately settles for an optimal
balance (regulatory, nation-states, technology innovators/manufacturers)
6. Emerging data, devices, and services are targeted by Threat Agents
pursuing their objectives, driven by their specific motivations
Industrybestpracticesandperspectives
13
The Best Organizations
a
Seeks Optimal Risk
Risk management planning
Anticipates impacts
Balance Cost, Risk, & Usability
Adapts to shifting demands
Comprehensive Processes
Security as a continuous cycle
Continuous improvement process
Technology and Behaviors
Obstacles and Opposition
Leads into the Future
Clearly defines success
Plans for a sustainable future
Roles and accountability
Continuously adapting
14
Important Considerations…
15
Smarter vs More
Collaboration across security
functions improving effectiveness
Better IT choices & enablement
Properly balancing the risk, cost,
and usability constraints
Expectations Drive Change
Society’s expectations shift with
pain, impact, and inconvenience
Trust will be valued, demanded
Security, privacy, and controls will
align with greater impacts
Controls Must Adapt
Innovation intersecting emerging
attacks to keep pace with attackers
Static defenses are easy to defeat
Intelligence, analysis, and actions
must feedback to improve systems
Future Technology to be Designed with Security
Smart Security innovation must deliver more capable solutions
to keep pace with threats
Ubiquitous Security must protect data wherever it exists or is used,
for all parties and devices across the compute landscape
Trusted Technology and security providers must be trustworthy,
in the creation and operation of their products
Strong Products and services must be hardened to resist
compromise and make security transparent to users
Open Platforms and security standards must be open to
promote collaboration and accelerate adoption
Security must be
part of the design
for future
technology. Adding
security after, is no
longer sufficient or
sustainable
16
Cybersecurityindustryworkforceopportunities
17
Lack of Security Talent Hinders the Industry
The lack of qualified cybersecurity talent will greatly restrict
the growth and effectiveness of security teams.
Academia is working to satiate demand, an estimated 2
million unfilled cybersecurity positions by 2017, but it will
take time.
Result:
1. Salaries will continue to rise until demand is met
2. Headhunting and retention of top talent becomes
ruthlessly competitive
3. Leadership and technical roles in greatest demand
4. Outsourcing to MSSP’s and security firms will increase
Cybersecurity Workforce Shortage
o 1.5-2 million estimated unfilled positions by 2017
o Job postings rose 91% (2010-2014)
o Leaders and engineers in highest demand
o Professional Services, Finance, Defense and
Manufacturing are leading sectors
o Finance, Healthcare, and Retail are growing
fastest
o ‘Hybrid’ jobs are increasing, contributing to
demand
Neededskills,training,andstudentresources
20
Skills and Training
The best way to prepare the next generation of
cybersecurity professionals:
• Hard Skills (technical)
• Soft Skills (behavior)
• Experience (contextual)
• Job Market Insights (opportunity data)
Hard
Skills
Soft Skills
Experience
Job
Market
Insights
Navigate
to
Success
Soft Skills are Important
1. Dependability – Being dependable means that you do what you say you will, when you say you will. You can be trusted
to complete any task, and you will do it well.
2. Motivation – You should be able to motivate yourself to get tasks done, and take the initiative to find new ways to
improve upon not only yourself and your work, but also your organization.
3. Communication – This is one of those skills you hear about all the time, and that’s for a reason. Communication is the
key to any human interaction, especially in the workplace.
4. Commitment – Employers want to know that you’re not only committed to the company and your job, but to turning out
the best work you can, every time.
5. Creativity – Can you think about problems in a new and interesting way? Show your employer how.
6. Problem Solving – If you’re confronted with a problem, employers want to know that you will do everything you can to
fix it. Your creative skills will come in handy here.
7. Flexibility – Sometimes, your job is going to be a little like a roller coaster. Can you adjust to the chaos?
8. Teamwork – You’re not done with group work after graduate school. Working in a team is an essential part of almost
every job.
9. Leadership – You may not be a natural born leader, but can you step up and guide either a group of people or a process
if necessary?
10. Time Management – Ability to balance workloads and prioritize what gets done, in the face of many deliverables
http://www.nationalsoftskills.org/top-10-soft-skills-for-success/
Experience and Certification
Source: Burning Glass Technologies report -
Job Market Intelligence: Cybersecurity Jobs, 2015
Job Posting Requirements
35% Industry certifications
84% Bachelors degree or higher
83% 3+ years of experience
10% Security Clearance
Relationship between experience and certification
• Entry level certifications typically require less than 3 years
of experience
• Advanced certifications require at least 3-5 years
experience
Many, Many Certifications
GSLC: GIAC Security Leadership Management
GISP: GIAC Information Security Professional Management
GCPM: GIAC Certified Project Manager Management
GSEC: GIAC Security Essentials Security Administration
GCIH: GIAC Certified Incident Handler Security Administration
GCIA: GIAC Certified Intrusion Analyst Security Administration
GPEN: GIAC Penetration Tester Security Administration
GWAPT: GIAC Web Application Penetration Tester Security Administration
GISF: GIAC Information Security Fundamentals Security Administration
GCWN: GIAC Certified Windows Security Admin Security Administration
GPPA: GIAC Certified Perimeter Protection Analyst Security Administration
GCED: GIAC Certified Enterprise Defender Security Administration
GICSP: Global Industrial Cyber Security Professional Security Administration
GXPN: GIAC Exploit Researcher & Adv. Pen Tester Security Administration
GAWN: GIAC Assess & Audit Wireless Networks Security Administration
GCUX: GIAC Certified UNIX Security Administrator Security Administration
GMOB: GIAC Mobile Device Security Analyst Security Administration
GMON: GIAC Continuous Monitoring Certification Security Administration
GCCC: GIAC Critical Controls Certification Security Administration
GPYC: GIAC Python Coder Security Administration
GASF: GIAC Advanced Smartphone Forensics Forensics
GCFE: GIAC Certified Forensic Examiner Forensics
GREM: GIAC Reverse Engineering Malware Forensics
GCFA: GIAC Certified Forensic Analyst Forensics
GNFA: GIAC Network Forensic Analyst Forensics
GSSP-JAVA: GIAC Secure SW Programmer-Java Software Security
GWEB: GIAC Certified Web Application Defender Software Security
GSSP-.NET: GIAC Secure SW Programmer- .NET Software Security
GLEG: GIAC Law of Data Security & Investigations Legal
GSNA: GIAC Systems and Network Auditor Audit
NICE Framework
National Initiative for Cybersecurity Education framework (NCWIF)
http://csrc.nist.gov/nice/framework
• Reference resource defining cybersecurity work and a standardized set of
required tasks and skills.
• Designed to help organizations educate, recruit, train and retain a qualified
cybersecurity workforce.
Job Market Insights
CyberSeek.org - free interactive resource for cybersecurity
job seekers, sponsored by NIST, CompTIA, and NICE.
Job Market Insights
• Job locations & salary
• Openings concentrations
• Demand averages
• Titles and roles
• Certification prevalence
• Alignment to NICE
framework
• Career advancement
pathways
The Future of Cybersecurity Education is Bright
 Emerging challenges will drive the needs in
cybersecurity – Understand the market needs
 Employers will expect workers to know and apply
industry best practices and perspectives – Align
academics to the future expectations
 The roles are expanding for incoming
cybersecurity workforce – Prepare students for
the new roles
 Resources are emerging to assist academic staff
and graduates to understand the needed skills
and opportunities – Empower students to be self-
sufficient in tracking employment demands
Challenges for the Next Generation of Cybersecurity Professionals - Matthew Rosenquist
Challenges for the Next Generation of Cybersecurity Professionals - Matthew Rosenquist

More Related Content

What's hot

The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
Matthew Rosenquist
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
Bradford Sims
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
PECB
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
Segun Ebenezer Olaniyan
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
Symantec
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
PECB
 

What's hot (20)

The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 

Viewers also liked

Cyber Security Career Advice
Cyber Security Career AdviceCyber Security Career Advice
Cyber Security Career Advice
Donald E. Hester
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
Case IQ
 
Investigation Interview: Elicitation Techniques
Investigation Interview: Elicitation TechniquesInvestigation Interview: Elicitation Techniques
Investigation Interview: Elicitation Techniques
Case IQ
 
Best Practices for Conducting Sexual Harassment Investigations
Best Practices for Conducting Sexual Harassment InvestigationsBest Practices for Conducting Sexual Harassment Investigations
Best Practices for Conducting Sexual Harassment Investigations
Case IQ
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to
IBM Analytics
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
William McBorrough
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
Tracxn
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
Sounil Yu
 
Tracxn Research - Finance and Accounting Landscape, August 2016
Tracxn Research - Finance and Accounting Landscape, August 2016Tracxn Research - Finance and Accounting Landscape, August 2016
Tracxn Research - Finance and Accounting Landscape, August 2016
Tracxn
 
An alternate view of the future
An alternate view of the futureAn alternate view of the future
An alternate view of the future
ProductNation/iSPIRT
 
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn
 
Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introduction
IBM Analytics
 
Fjord Trends 2017
Fjord Trends 2017 Fjord Trends 2017
Fjord Trends 2017
Fjord
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (17)

Cyber Security Career Advice
Cyber Security Career AdviceCyber Security Career Advice
Cyber Security Career Advice
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations Technology Explosion and Future of Investigations
Technology Explosion and Future of Investigations
 
Investigation Interview: Elicitation Techniques
Investigation Interview: Elicitation TechniquesInvestigation Interview: Elicitation Techniques
Investigation Interview: Elicitation Techniques
 
Best Practices for Conducting Sexual Harassment Investigations
Best Practices for Conducting Sexual Harassment InvestigationsBest Practices for Conducting Sexual Harassment Investigations
Best Practices for Conducting Sexual Harassment Investigations
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to10 WealthTech podcasts every wealth advisor should listen to
10 WealthTech podcasts every wealth advisor should listen to
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Tracxn Research - Finance and Accounting Landscape, August 2016
Tracxn Research - Finance and Accounting Landscape, August 2016Tracxn Research - Finance and Accounting Landscape, August 2016
Tracxn Research - Finance and Accounting Landscape, August 2016
 
An alternate view of the future
An alternate view of the futureAn alternate view of the future
An alternate view of the future
 
Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016Tracxn Research: Enterprise Security Landscape, August 2016
Tracxn Research: Enterprise Security Landscape, August 2016
 
Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introduction
 
Fjord Trends 2017
Fjord Trends 2017 Fjord Trends 2017
Fjord Trends 2017
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Challenges for the Next Generation of Cybersecurity Professionals - Matthew Rosenquist

Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
Humphrey Humphrey
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
World's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfWorld's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdf
InsightsSuccess4
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Phil Huggins FBCS CITP
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
Chandra Sekhar Tondepu
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
Ciente
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
Luke Farrell
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
PelorusTechnologies
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Mighty Guides, Inc.
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
accenture
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
Booz Allen Hamilton
 

Similar to Challenges for the Next Generation of Cybersecurity Professionals - Matthew Rosenquist (20)

Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
World's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfWorld's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdf
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Ciso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal itCiso organizational priorities to build a resilient bimodal it
Ciso organizational priorities to build a resilient bimodal it
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 

More from Matthew Rosenquist

Improving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security BudgetsImproving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security Budgets
Matthew Rosenquist
 
Six Scenarios How Russia May Use Nukes.pdf
Six Scenarios How Russia May Use Nukes.pdfSix Scenarios How Russia May Use Nukes.pdf
Six Scenarios How Russia May Use Nukes.pdf
Matthew Rosenquist
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
Matthew Rosenquist
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
Matthew Rosenquist
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
Matthew Rosenquist
 
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Matthew Rosenquist
 
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
Matthew Rosenquist
 
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew RosenquistCybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Matthew Rosenquist
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
Matthew Rosenquist
 
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
Matthew Rosenquist
 
2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat ReportMatthew Rosenquist
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
Matthew Rosenquist
 
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
Matthew Rosenquist
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist
Matthew Rosenquist
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Matthew Rosenquist
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013Matthew Rosenquist
 

More from Matthew Rosenquist (18)

Improving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security BudgetsImproving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security Budgets
 
Six Scenarios How Russia May Use Nukes.pdf
Six Scenarios How Russia May Use Nukes.pdfSix Scenarios How Russia May Use Nukes.pdf
Six Scenarios How Russia May Use Nukes.pdf
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
 
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
 
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew RosenquistCybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
 
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
 
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
 
2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
2015 Global APT Summit - Understanding APT threat agent characteristics is ke...
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist2015 Global APT Summit Matthew Rosenquist
2015 Global APT Summit Matthew Rosenquist
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013Intel IT Experts Tour   Cyber Security - Matthew Rosenquist 2013
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Challenges for the Next Generation of Cybersecurity Professionals - Matthew Rosenquist

  • 3. Agenda  Introduction  Future challenges in cybersecurity drive demand  Industry best practices and perspectives  Cybersecurity industry workforce opportunities  Needed skills, training, and student resources  Questions and Answers discussion
  • 4. Biography Matthew Rosenquist Cybersecurity Strategist and Evangelist, Intel Corporation 25 years in the field of security, specializing in strategy, threats, operations, crisis management, measuring value, communications, and establishing strategic organizations which deliver optimal security capabilities. As a cybersecurity strategist, he champions the meaningfulness of security, advises on emerging opportunities and threats, drives industry collaboration, and advocates a sustainable balance of cost, controls, and productivity across business, governments, and academic sectors. • Consults globally to governments, academia, business, and cybersecurity professionals • Built and managed Intel’s global Security Operations Center • First Incident Commander for Intel’s worldwide CERT • Managed security for Intel’s multi-billion dollar worldwide M&A activities • Overseen internal platform security products and services • Strategic planner for the Intel Architecture security playbook • Unified synergies forming the 3rd largest global security product organization • Conducted investigations, defended corporate assets, established policies, developed strategies to protect Intel’s global manufacturing Matthew is an outspoken evangelist and advocate of cybersecurity who delivers keynotes, speeches, lectures, and has a significant social following of security technologists and global professionals. 4 Twitter: @Matt_Rosenquist LinkedIn Blogs: https://www.linkedin.com/today/author/matthewrosenquist
  • 6. Security Industry Needs Leadership “...If security breaks down, technology breaks down” Brian Krebs Noted Cybersecurity Reporter
  • 7. Innovation Drives Risk Convergence New technology bridges the virtual and physical worlds, to connect and enrich peoples lives
  • 8. Rapid Shift of Skills in the Industry Needed skills will change over time, as security, privacy, and safety evolve. Strategies will evolve, to expand what is possible, in order to align with shifting expectations. The next generation of security professionals must understand and be able to contribute to the delivery of best-known-practices.
  • 9. Evolving Landscape, Adversaries, and Battlefield i 29countries Have formal cyber warfare units i 63countries Use cyber tools for surveillance i $19billion US 2017 proposed budget for cybersecurity i $6trillion Cyber-crime impact globally by 2021 i 200%increase In cyber-crime in the last 5 years i $3–$90trillion Aggregate innovation impact of cyber-risks by 2020 Hard-AttackDifficulty-Easy IMPACT GOES FAR BEYOND Cybersecurity costs typically measured as part of an incident Actual costs of long term impacts including lost contract revenue, operational disruption, devaluation of trade name, loss of IP, rises in insurance premiums, increased cost to raise debt, customer relationship impacts %COST ~1%* Source: US Tech Manufacturing Company Case Study , Deloitte ~99% i 35%USpopulation Healthcare records exposed in 2015 i 400kNewMalware/Day 575 million unique samples of malware exist i +2BillionUsers 4 billion users online by 2020, up from 2+ billion in today i 50-200BillionDevices Connected to the Internet by 2020 i 25+MillionApplications Connected by 2020 creating 50x the volume of data 9
  • 10. Changing Digital World 10  Growing Number of Users: 4B connected people More Users New Devices Innovative Usages Generating Vast Data Sensitive Functions Increased Target Value  New Devices Types: 50-200B IoT devices  Innovative Usages and Access: 25M+ applications  Creation of Vast Amounts of Data: 50 Trillion gigabytes  Critical Functionality: Infrastructure, Defense, Transportation Creates Targets with Increased Value
  • 11. 4 Levels of Cybersecurity Impacts 11 Denial of Service (A) • Access of customers • Availability of data, systems, & services • DDOS network attacks, ransom-ware data locking attacks Data Theft & Exposure (C) • ID Theft • Privacy • Data Breach • Transaction data • Database hacks, skimming, lost storage, keylogging Monitor & Manipulate (I) • Internal-access surveillance for advantage • Tamper / Manipulation • Long-term data gathering campaign Own & Obliterate (C/I/A) • Administrative ownership and control • Capability of unrecoverable obliteration • Strategic attack, undermining of org capability Security Competency Attacker Innovation Attacks evolve over time for different technology and usages
  • 12. Security Futures Summary: 12 1. Threats remain equitable to the growth and use of technology 2. Age of massive connectivity (ex. IoT, mesh, 5G/6G, blockchains, etc.) drives opportunities (for good and bad – cyber threats will take advantage) 3. Society expectations raise for cyber security, privacy, and safety 4. Tipping points approach: threats to life-safety, cybercrime hyper-growth, offensive cyberwarfare 5. Pendulum swings towards more security, ultimately settles for an optimal balance (regulatory, nation-states, technology innovators/manufacturers) 6. Emerging data, devices, and services are targeted by Threat Agents pursuing their objectives, driven by their specific motivations
  • 14. The Best Organizations a Seeks Optimal Risk Risk management planning Anticipates impacts Balance Cost, Risk, & Usability Adapts to shifting demands Comprehensive Processes Security as a continuous cycle Continuous improvement process Technology and Behaviors Obstacles and Opposition Leads into the Future Clearly defines success Plans for a sustainable future Roles and accountability Continuously adapting 14
  • 15. Important Considerations… 15 Smarter vs More Collaboration across security functions improving effectiveness Better IT choices & enablement Properly balancing the risk, cost, and usability constraints Expectations Drive Change Society’s expectations shift with pain, impact, and inconvenience Trust will be valued, demanded Security, privacy, and controls will align with greater impacts Controls Must Adapt Innovation intersecting emerging attacks to keep pace with attackers Static defenses are easy to defeat Intelligence, analysis, and actions must feedback to improve systems
  • 16. Future Technology to be Designed with Security Smart Security innovation must deliver more capable solutions to keep pace with threats Ubiquitous Security must protect data wherever it exists or is used, for all parties and devices across the compute landscape Trusted Technology and security providers must be trustworthy, in the creation and operation of their products Strong Products and services must be hardened to resist compromise and make security transparent to users Open Platforms and security standards must be open to promote collaboration and accelerate adoption Security must be part of the design for future technology. Adding security after, is no longer sufficient or sustainable 16
  • 18. Lack of Security Talent Hinders the Industry The lack of qualified cybersecurity talent will greatly restrict the growth and effectiveness of security teams. Academia is working to satiate demand, an estimated 2 million unfilled cybersecurity positions by 2017, but it will take time. Result: 1. Salaries will continue to rise until demand is met 2. Headhunting and retention of top talent becomes ruthlessly competitive 3. Leadership and technical roles in greatest demand 4. Outsourcing to MSSP’s and security firms will increase
  • 19. Cybersecurity Workforce Shortage o 1.5-2 million estimated unfilled positions by 2017 o Job postings rose 91% (2010-2014) o Leaders and engineers in highest demand o Professional Services, Finance, Defense and Manufacturing are leading sectors o Finance, Healthcare, and Retail are growing fastest o ‘Hybrid’ jobs are increasing, contributing to demand
  • 21. Skills and Training The best way to prepare the next generation of cybersecurity professionals: • Hard Skills (technical) • Soft Skills (behavior) • Experience (contextual) • Job Market Insights (opportunity data) Hard Skills Soft Skills Experience Job Market Insights Navigate to Success
  • 22. Soft Skills are Important 1. Dependability – Being dependable means that you do what you say you will, when you say you will. You can be trusted to complete any task, and you will do it well. 2. Motivation – You should be able to motivate yourself to get tasks done, and take the initiative to find new ways to improve upon not only yourself and your work, but also your organization. 3. Communication – This is one of those skills you hear about all the time, and that’s for a reason. Communication is the key to any human interaction, especially in the workplace. 4. Commitment – Employers want to know that you’re not only committed to the company and your job, but to turning out the best work you can, every time. 5. Creativity – Can you think about problems in a new and interesting way? Show your employer how. 6. Problem Solving – If you’re confronted with a problem, employers want to know that you will do everything you can to fix it. Your creative skills will come in handy here. 7. Flexibility – Sometimes, your job is going to be a little like a roller coaster. Can you adjust to the chaos? 8. Teamwork – You’re not done with group work after graduate school. Working in a team is an essential part of almost every job. 9. Leadership – You may not be a natural born leader, but can you step up and guide either a group of people or a process if necessary? 10. Time Management – Ability to balance workloads and prioritize what gets done, in the face of many deliverables http://www.nationalsoftskills.org/top-10-soft-skills-for-success/
  • 23. Experience and Certification Source: Burning Glass Technologies report - Job Market Intelligence: Cybersecurity Jobs, 2015 Job Posting Requirements 35% Industry certifications 84% Bachelors degree or higher 83% 3+ years of experience 10% Security Clearance Relationship between experience and certification • Entry level certifications typically require less than 3 years of experience • Advanced certifications require at least 3-5 years experience
  • 24. Many, Many Certifications GSLC: GIAC Security Leadership Management GISP: GIAC Information Security Professional Management GCPM: GIAC Certified Project Manager Management GSEC: GIAC Security Essentials Security Administration GCIH: GIAC Certified Incident Handler Security Administration GCIA: GIAC Certified Intrusion Analyst Security Administration GPEN: GIAC Penetration Tester Security Administration GWAPT: GIAC Web Application Penetration Tester Security Administration GISF: GIAC Information Security Fundamentals Security Administration GCWN: GIAC Certified Windows Security Admin Security Administration GPPA: GIAC Certified Perimeter Protection Analyst Security Administration GCED: GIAC Certified Enterprise Defender Security Administration GICSP: Global Industrial Cyber Security Professional Security Administration GXPN: GIAC Exploit Researcher & Adv. Pen Tester Security Administration GAWN: GIAC Assess & Audit Wireless Networks Security Administration GCUX: GIAC Certified UNIX Security Administrator Security Administration GMOB: GIAC Mobile Device Security Analyst Security Administration GMON: GIAC Continuous Monitoring Certification Security Administration GCCC: GIAC Critical Controls Certification Security Administration GPYC: GIAC Python Coder Security Administration GASF: GIAC Advanced Smartphone Forensics Forensics GCFE: GIAC Certified Forensic Examiner Forensics GREM: GIAC Reverse Engineering Malware Forensics GCFA: GIAC Certified Forensic Analyst Forensics GNFA: GIAC Network Forensic Analyst Forensics GSSP-JAVA: GIAC Secure SW Programmer-Java Software Security GWEB: GIAC Certified Web Application Defender Software Security GSSP-.NET: GIAC Secure SW Programmer- .NET Software Security GLEG: GIAC Law of Data Security & Investigations Legal GSNA: GIAC Systems and Network Auditor Audit
  • 25. NICE Framework National Initiative for Cybersecurity Education framework (NCWIF) http://csrc.nist.gov/nice/framework • Reference resource defining cybersecurity work and a standardized set of required tasks and skills. • Designed to help organizations educate, recruit, train and retain a qualified cybersecurity workforce.
  • 26. Job Market Insights CyberSeek.org - free interactive resource for cybersecurity job seekers, sponsored by NIST, CompTIA, and NICE.
  • 27. Job Market Insights • Job locations & salary • Openings concentrations • Demand averages • Titles and roles • Certification prevalence • Alignment to NICE framework • Career advancement pathways
  • 28. The Future of Cybersecurity Education is Bright  Emerging challenges will drive the needs in cybersecurity – Understand the market needs  Employers will expect workers to know and apply industry best practices and perspectives – Align academics to the future expectations  The roles are expanding for incoming cybersecurity workforce – Prepare students for the new roles  Resources are emerging to assist academic staff and graduates to understand the needed skills and opportunities – Empower students to be self- sufficient in tracking employment demands